Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Reply To: OCU C)ISSO D Discussion Lesson 08

#85191
Marcena Davis
Participant

Hi Kelly! You have provided a great comparison between symmetric and asymmetric cryptography. It’s interesting to know how symmetric cryptography uses the same key for encryption and decryption while asymmetric cryptography uses a pair of keys – one public and one private. Your points about the pros and cons of each type are also informative.

One example to consider for symmetric cryptography is the Advanced Encryption Standard (AES) used by many companies to secure their data. As for asymmetric cryptography, a popular example is the RSA algorithm which is widely used in secure communication protocols like SSL/TLS.
I completely agree with you that the validation of key pair ownership in asymmetric cryptography can be time-consuming and exposure, destruction, or loss of private keys can compromise the integrity of the system. For symmetric cryptography, key exchange is often a challenge as it has to be done out-of-band and can potentially be insecure.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .